Journal of Systems Engineering and Electronics ›› 2006, Vol. 17 ›› Issue (2): 410-416.doi: 10.1016/S1004-4132(06)60070-4

• COMPUTER DEVELOPMENT AND PRACTICE • Previous Articles     Next Articles

Flooding attack and defence in Ad hoc networks *

Yi Ping1, Hou Yafei3, Thong Yiping2, Zhang Shiyong2 & Dai Zhoulin2   

  1. 1. School of Information Security Engineering, Shanghai Jiaotong Univ. , Shanghai 200030, P. R. China;
    2. Dept. of Computing and Information Technology, Fudan Univ. , Shanghai 200433, P. R. China;
    3. Graduate School of Engineering, Kochi University of Technology, Rochi 782-8502, Japaa
  • Online:2006-06-26 Published:2019-12-20

Abstract:

Mobile ad hoc networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a new DOS attack and its defense in ad hoc networks. The new DOS attack, called Ad hoc Flooding Attack(AHFA), is that intruder broadcasts mass Route Request packets to exhaust the communication bandwidth and node resource so that the valid communication can not be kept After analyzed Ad hoc Flooding Attack, we develop Flooding Attack Prevention (FAP), a generic defense against the Ad hoc Flooding Attack When the intruder broadcasts exceeding packets of Route Request, the immediate neighbors of the intruder record the rate of Route Request Once the threshold is exceeded, nodes deny any future request packets from the intruder. The results of our implementation show FAP can prevent the Ad hoc Flooding attack efficiently.

Key words: computer networks, security, mobile Ad hoc networks, routing protocol, denial of service, Ad hoc flooding attack